A vulnerability in the SSH subsystem of Cisco Adaptive Security Appliance (ASA) Software could allow an authenticated, remote attacker to execute operating system commands as root.
This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by submitting crafted input when executing remote CLI commands over SSH. A successful exploit could allow the attacker to execute commands on the underlying operating system with root-level privileges. An attacker with limited user privileges could use this vulnerability to gain complete control over the system.
Metrics
Affected Vendors & Products
References
History
Thu, 24 Oct 2024 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Cisco
Cisco adaptive Security Appliance Software |
|
CPEs | cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:* | |
Vendors & Products |
Cisco
Cisco adaptive Security Appliance Software |
|
Metrics |
ssvc
|
Wed, 23 Oct 2024 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability in the SSH subsystem of Cisco Adaptive Security Appliance (ASA) Software could allow an authenticated, remote attacker to execute operating system commands as root. This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by submitting crafted input when executing remote CLI commands over SSH. A successful exploit could allow the attacker to execute commands on the underlying operating system with root-level privileges. An attacker with limited user privileges could use this vulnerability to gain complete control over the system. | |
Title | Cisco Adaptive Security Appliance Software Remote Command Injection Vulnerability | |
Weaknesses | CWE-146 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: cisco
Published: 2024-10-23T17:08:34.266Z
Updated: 2024-10-26T03:55:27.248Z
Reserved: 2023-11-08T15:08:07.641Z
Link: CVE-2024-20329
Vulnrichment
Updated: 2024-10-24T16:27:08.332Z
NVD
Status : Awaiting Analysis
Published: 2024-10-23T17:15:17.457
Modified: 2024-10-25T12:56:36.827
Link: CVE-2024-20329
Redhat
No data.